Abstract
Internet of Things (IoT) has been a part of our day-to-day lives for a few decades, and it has been utilised to make our lives easier and more pleasant in many ways. However, as much as it provides more comfort, it also presents a myriad of challenges. The majority of these challenges are caused by security risks and bad intentions on the part of the users. The threats were mostly focussed on data confidentiality and privacy, among other things. The Internet of Things (IoT) has sparked widespread anxiety about the potential for information leakage. As a result, a secure environment is essential to ensure that data is transmitted from its devices over the network without being compromised. Energy and computational power, on the other hand, are two key limitations for any IoT device, since it is often run on a remote system with limited energy supply and computing capacity; it also transfers data into the world of the Internet in a relatively unprotected manner. In this work, the authors attempted to identify several current steganographic processes that may be used with Internet of Things devices while requiring little computing and energy resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jaidka H, Sharma N, Singh R (2020) Evolution of IoT to IIoT: applications & challenges. In: Proceedings of the international conference on innovative computing & communications (ICICC), p 6
Indu P, Bhattacharyya S (2020) Early work vis-à -vis current trends in internet of things security. In: Daimi K, Francia III G (eds) Innovations in cybersecurity education. Springer, Cham, pp 127–156. https://doi.org/10.1007/978-3-030-50244-7_8
Retrieved from https://internetofthingswiki.com/internet-of-things-definition/. Accessed on 23 Jan 2022
Biswas A, Indu P, Bhattacharyya S (2021) Real-time watermarking of medical images and secure transmission through steganography. In: Mukherjee M, Mandal J, Bhattacharyya S, Huck C, Biswas S (eds) Advances in medical physics and healthcare engineering. Lecture notes in bioengineering. Springer, Singapore, pp 497–506. https://doi.org/10.1007/978-981-33-6915-3_49
Sharma N et al. (2019) Secure hash authentication in IoT based applications. Procedia Comput Sci 165:328–335
Rout H, Mishra BK (2014) Pros and cons of cryptography, steganography and perturbation techniques. IOSR J Electron Commun Eng (IOSR-JECE), pp 76–81. e-ISSN:2278-2834, p-ISSN:2278-8735
Malan J, Eager J, Lale-Demoz E, Ranghieri GC, Brady M (2020) Framing the nature and scale of cyber security vulnerabilities within the current consumer internet of things (IoT) landscape. Centre for Strategy & Evaluation Services LLP, United Kingdom
Retrieved from https://www.fortinet.com/blog/industry-trends/examining-top-iot-security-threats-and-attack-vectors. Accessed on 23 Jan 2022
Indu P, Bhattacharyya S (2021) Hiding IoT communication using DCT difference modulation (DCTDM). In: Mukherjee M, Mandal J, Bhattacharyya S, Huck C, Biswas S (eds) Advances in medical physics and healthcare engineering. Lecture notes in bioengineering. Springer, Singapore, pp 371–380. https://doi.org/10.1007/978-981-33-6915-3_37
Maji G, Mandal S (2020) A forward email based high capacity text steganography technique using a randomized and indexed word dictionary. Multimed Tools Appl. 79:26549–26569. https://doi.org/10.1007/s11042-020-09329-z
Kabulov A et al. (2021) Algorithmic method of security of the Internet of Things based on steganographic coding. In: 2021 IEEE International IOT, electronics and mechatronics conference (IEMTRONICS). IEEE, pp 1–5. https://doi.org/10.1109/IEMTRONICS52119.2021.9422588
Yin JHJ et al. (2015) Internet of things: securing data using image steganography. In: 2015 3rd International conference on artificial intelligence, modelling and simulation (AIMS). IEEE, pp 310–314. https://doi.org/10.1109/AIMS.2015.56
Amjath MIM, Senthooran V (2020) Secure communication using steganography in IoT environment. In: 2020 2nd International conference on advancements in computing (ICAC). IEEE, pp 114–119. https://doi.org/10.1109/ICAC51239.2020.9357260
Meng R et al. (2019) A steganography algorithm based on CycleGAN for covert communication in the internet of things. IEEE Access 7:90574–90584. https://doi.org/10.1109/ACCESS.2019.2920956
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sarkar, U.D., Samanta, N., Indu, P. (2023). A Study on Hiding Internet of Things (IoT) Communication. In: Chakraborty, B., Biswas, A., Chakrabarti, A. (eds) Advances in Data Science and Computing Technologies. ADSC 2022. Lecture Notes in Electrical Engineering, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-99-3656-4_10
Download citation
DOI: https://doi.org/10.1007/978-981-99-3656-4_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3655-7
Online ISBN: 978-981-99-3656-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)